The strongest form of MFA? | Why your MFA may need an upgrade
MFA methods have evolved greatly over the years to accommodate shifts in the attack surface as well as new attack methods. In this article, I wanted to cover the evolution…
MFA methods have evolved greatly over the years to accommodate shifts in the attack surface as well as new attack methods. In this article, I wanted to cover the evolution…
As a general principle, you should always try to institute a strict policy of requiring managed devices to access corporate resources across your customers. You would think selling a customer…
Checklist do not equal compliance One of the major gaps I hear when talking to MSPs about security and compliance is a lack of understanding the “why” behind the security…
Checklist do not equal compliance One of the major gaps I hear when talking to MSPs about security and compliance is a lack of understanding the “why” behind the security…
🛡️ Mapping Microsoft 365 Security Controls to NIST CSF 2.0 NIST has released the 2.0 draft of its Cybersecurity Framework so I wanted to create a new enablement guide that…
Many of us out there are using Microsoft Teams as our main source of collaboration. This includes chats, meetings, and even file sharing. As an organization, its where we are…
When the Cybersecurity & Infrastructure Security Agency (CISA) released the Secure Cloud Business applications (SCuBA) project, I was pretty excited but it left me wanting more. I wanted more enablement…
In this article, I wanted to break down some of the trends in the Cyber Insurance market that I am seeing along with some predictions for 2023 and beyond. This…
CISA has recently released a project called SCuBA which is providing a security baseline for Microsoft 365. This project is currently in the alpha stages but there is a ton…
MFA settings in Azure AD have evolved so much over the past few years and I believe that will continue at an even greater pace with the introduction of Microsoft…